Search alternatives:
using algorithm » cosine algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
development a » development _ (Expand Search), developments _ (Expand Search), developing a (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
development a » development _ (Expand Search), developments _ (Expand Search), developing a (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
-
161
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
162
Content-Aware Adaptive Video Streaming Using Actor-Critic Deep Reinforcement Learning
Published 2024Get full text
doctoralThesis -
163
-
164
-
165
BUC algorithm for iceberg cubes
Published 2003“…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
166
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article -
167
An Improved Quorum Selection Algorithm
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
168
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
Published 2017“…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
Get full text
-
169
-
170
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
171
Modeling of Chlorophyll-a and Eutrophication Indicators in the Dubai Creek Area using Remote Sensing
Published 2015Get full text
doctoralThesis -
172
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
-
173
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
Get full text
-
174
-
175
Environmental/economic power dispatch using multiobjective evolutionary algorithms: a comparative study
Published 2003“…A comparative study of newly developed Pareto-based multiobjective evolutionary algorithms (MOEA) applied to a nonlinear power system multiobjective optimization problem is presented in this paper. …”
Get full text
Get full text
article -
176
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
Get full text
article -
177
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
Get full text
article -
178
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
Published 2019“…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
-
179
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
-
180
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
Published 2024“…Bagged Ensemble Trees outperform other algorithms in estimating blood glucose level with a correlation coefficient of 0.90. …”